AUB ScholarWorks

Short paper: PATRIOT - A policy-based, multi-level security protocol for safekeeping audit logs on wireless devices

Show simple item record

dc.contributor.author Itani W.
dc.contributor.author Kayssi A.
dc.contributor.author Chehab A.
dc.contributor.editor
dc.date 2005
dc.date.accessioned 2017-09-07T07:07:48Z
dc.date.available 2017-09-07T07:07:48Z
dc.date.issued 2005
dc.identifier 10.1109/SECURECOMM.2005.45
dc.identifier.isbn 0769523692
dc.identifier.isbn 9780769523699
dc.identifier.issn
dc.identifier.uri http://hdl.handle.net/10938/11611
dc.description.abstract This paper presents PATRIOT (Policy-bAsed, mulTi-level secuRIty prOTocol), an optimized, policy-driven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable security model and specifies a flexible, multi-level, and fine-grained encryption methodology that provides the suitable security strength without compromising performance. PATRIOT is designed in a platform-neutral manner and it can be deployed on a wide range of wireless devices and operating systems. © 2005 IEEE.
dc.format.extent
dc.format.extent Pages: (240-242)
dc.language English
dc.publisher LOS ALAMITOS
dc.relation.ispartof Publication Name: Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; Conference Title: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; Conference Date: 5 September 2005 through 9 September 2005; Conference Location: Athens; Publication Year: 2005; Volume: 2005; Pages: (240-242);
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title Short paper: PATRIOT - A policy-based, multi-level security protocol for safekeeping audit logs on wireless devices
dc.type Conference Paper
dc.contributor.affiliation Itani, W., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Kayssi, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Chehab, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.authorAddress Itani, W.; Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail
dc.contributor.authorFaculty Faculty of Engineering and Architecture
dc.contributor.authorInitials Itani, W
dc.contributor.authorInitials Kayssi, A
dc.contributor.authorInitials Chehab, A
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress Itani, W (reprint author), Amer Univ Beirut, Dept Elect and Comp Engn, Beirut 11072020, Lebanon.
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited BELLARE M, 1997, FORWARE INTEGRITY SE; Schneier B, 1997, FUTURE GENER COMP SY, V13, P9, DOI 10.1016-S0167-739X(97)00004-6; Schneier B., 1999, ACM T INFORM SYST, V2, P159, DOI 10.1145-317087.317089
dc.description.citedCount 1
dc.description.citedTotWOSCount 1
dc.description.citedWOSCount 1
dc.format.extentCount 3
dc.identifier.articleNo 1607580
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 33847286901
dc.identifier.url
dc.publisher.address 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
dc.relation.ispartofConference Conference Title: 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 : Conference Date: 5 September 2005 through 9 September 2005 , Conference Location: Athens.
dc.relation.ispartofConferenceCode 69277
dc.relation.ispartofConferenceDate 5 September 2005 through 9 September 2005
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc Athens
dc.relation.ispartofConferenceSponsor IEEE Communications Society;Create-Net
dc.relation.ispartofConferenceTitle 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr
dc.relation.ispartOfIssue
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
dc.relation.ispartofPubTitleAbbr Proc. 1st Int. Conf. Sec. and Priv. for Emerg. Areas in Commun. Netw. SecureComm 2005
dc.relation.ispartOfSpecialIssue
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume 2005
dc.source.ID WOS:000232877600027
dc.type.publication Book
dc.subject.otherAuthKeyword Audit logs
dc.subject.otherAuthKeyword Customizable security
dc.subject.otherAuthKeyword Policy-driven security
dc.subject.otherAuthKeyword Security
dc.subject.otherChemCAS
dc.subject.otherIndex Computer architecture
dc.subject.otherIndex Computer operating systems
dc.subject.otherIndex Optimization
dc.subject.otherIndex Public key cryptography
dc.subject.otherIndex Security of data
dc.subject.otherIndex Wireless telecommunication systems
dc.subject.otherIndex Policy-bAsed, mulTi-level secuRIty prOTocol (PATRIOT)
dc.subject.otherIndex Security architecture
dc.subject.otherIndex Security model
dc.subject.otherIndex Security protocol
dc.subject.otherIndex Network protocols
dc.subject.otherKeywordPlus
dc.subject.otherWOS Computer Science, Information Systems
dc.subject.otherWOS Engineering, Electrical and Electronic
dc.subject.otherWOS Telecommunications


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search AUB ScholarWorks


Browse

My Account